Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It also presents the optimal mud weight window for this field, which can be used to optimise the mud weights to minimise the wellbore instability issues. The results showed that an artificial neural network is a powerful tool for determining the breakout zones using the input data. The obtaining root mean square error and the determination coefficient were respectively 0.0082 and 0.959, by which the 1D MEM gave a high match between the predicted wellbore instabilities using the Mogi-failure criterion and the predicted breakout using the ANN model. Most borehole enlargements occur due to formation shear failures because of using low mud weights during drilling. The conclusion clarify the1.35 g/cc is the optimal mud weights for drilling new wells in this field of interest with fewer drilling issues.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreIn this research, Artificial Neural Networks (ANNs) technique was applied in an attempt to predict the water levels and some of the water quality parameters at Tigris River in Wasit Government for five different sites. These predictions are useful in the planning, management, evaluation of the water resources in the area. Spatial data along a river system or area at different locations in a catchment area usually have missing measurements, hence an accurate prediction. model to fill these missing values is essential.
The selected sites for water quality data prediction were Sewera, Numania , Kut u/s, Kut d/s, Garaf observation sites. In these five sites models were built for prediction of the water level and water quality parameters.
Diesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreDiesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreABSTRACT: BACKGROUND: Left ventricular hypertrophy is a significant risk factor for cardiovascular complications such as ischemic heart disease, heart failure, sudden death, atrial fibrillation, and stroke. A proper non-expensive tool is required for detection of this pathology. Different electrocardiographic (ECG) criteria were investigated; however, the results were conflicting regarding the accuracy of these criteria. OBJECTIVE: To assess the accuracy of three electrocardiographic criteria in diagnosis of left ventricular hypertrophy in adult patients with hypertension using echocardiography as a reference test. PATIENTS AND METHODS: This is a hospital-based cross sectional observational study which included 340 adult patients with a his
... Show More